2020-09-10 12:49:59 +00:00
|
|
|
package tlstunnel
|
2020-09-08 15:13:39 +00:00
|
|
|
|
|
|
|
import (
|
2020-09-09 12:08:20 +00:00
|
|
|
"context"
|
2020-09-08 16:24:16 +00:00
|
|
|
"crypto/tls"
|
2020-09-08 15:13:39 +00:00
|
|
|
"fmt"
|
|
|
|
"io"
|
2020-09-08 16:24:16 +00:00
|
|
|
"log"
|
2020-09-08 15:13:39 +00:00
|
|
|
"net"
|
2020-09-12 17:43:16 +00:00
|
|
|
"strings"
|
2020-12-22 11:06:14 +00:00
|
|
|
"sync/atomic"
|
2021-02-18 16:49:52 +00:00
|
|
|
"time"
|
2020-09-08 16:24:16 +00:00
|
|
|
|
2020-10-19 14:44:46 +00:00
|
|
|
"git.sr.ht/~emersion/go-scfg"
|
2020-09-08 16:24:16 +00:00
|
|
|
"github.com/caddyserver/certmagic"
|
2020-09-09 12:52:41 +00:00
|
|
|
"github.com/pires/go-proxyproto"
|
2020-10-09 12:45:55 +00:00
|
|
|
"github.com/pires/go-proxyproto/tlvparse"
|
2020-09-08 15:13:39 +00:00
|
|
|
)
|
|
|
|
|
2021-02-18 17:16:10 +00:00
|
|
|
const tlsHandshakeTimeout = 20 * time.Second
|
2021-02-18 16:49:52 +00:00
|
|
|
|
2021-02-17 17:33:07 +00:00
|
|
|
type acmeCache struct {
|
2021-02-18 17:20:47 +00:00
|
|
|
config atomic.Value
|
2021-02-17 17:33:07 +00:00
|
|
|
cache *certmagic.Cache
|
|
|
|
}
|
|
|
|
|
|
|
|
func newACMECache() *acmeCache {
|
|
|
|
cache := &acmeCache{}
|
|
|
|
cache.cache = certmagic.NewCache(certmagic.CacheOptions{
|
|
|
|
GetConfigForCert: func(certmagic.Certificate) (*certmagic.Config, error) {
|
2021-02-18 17:20:47 +00:00
|
|
|
return cache.config.Load().(*certmagic.Config), nil
|
2021-02-17 17:33:07 +00:00
|
|
|
},
|
|
|
|
})
|
|
|
|
return cache
|
|
|
|
}
|
|
|
|
|
2020-09-08 15:13:39 +00:00
|
|
|
type Server struct {
|
2020-10-19 15:27:29 +00:00
|
|
|
Listeners map[string]*Listener // indexed by listening address
|
|
|
|
Frontends []*Frontend
|
|
|
|
|
|
|
|
ManagedNames []string
|
|
|
|
UnmanagedCerts []tls.Certificate
|
|
|
|
|
|
|
|
ACMEManager *certmagic.ACMEManager
|
|
|
|
ACMEConfig *certmagic.Config
|
2020-12-22 11:06:14 +00:00
|
|
|
|
2021-02-17 17:33:07 +00:00
|
|
|
acmeCache *acmeCache
|
2020-12-22 11:06:14 +00:00
|
|
|
cancelACME context.CancelFunc
|
2020-09-08 16:24:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewServer() *Server {
|
2021-02-17 17:33:07 +00:00
|
|
|
// Make a copy of the defaults
|
|
|
|
acmeConfig := certmagic.Default
|
|
|
|
acmeManager := certmagic.DefaultACME
|
2020-09-08 16:24:16 +00:00
|
|
|
|
2021-02-17 17:33:07 +00:00
|
|
|
acmeManager.Agreed = true
|
2020-10-21 13:24:25 +00:00
|
|
|
// We're a TLS server, we don't speak HTTP
|
2021-02-17 17:33:07 +00:00
|
|
|
acmeManager.DisableHTTPChallenge = true
|
2020-09-08 16:24:16 +00:00
|
|
|
|
2020-09-09 11:15:03 +00:00
|
|
|
return &Server{
|
2020-09-09 12:08:20 +00:00
|
|
|
Listeners: make(map[string]*Listener),
|
2021-02-17 17:33:07 +00:00
|
|
|
ACMEManager: &acmeManager,
|
|
|
|
ACMEConfig: &acmeConfig,
|
2020-09-09 11:15:03 +00:00
|
|
|
}
|
2020-09-08 15:13:39 +00:00
|
|
|
}
|
|
|
|
|
2020-10-19 14:44:46 +00:00
|
|
|
func (srv *Server) Load(cfg scfg.Block) error {
|
2020-09-10 13:05:43 +00:00
|
|
|
return parseConfig(srv, cfg)
|
|
|
|
}
|
|
|
|
|
2020-09-09 11:15:03 +00:00
|
|
|
func (srv *Server) RegisterListener(addr string) *Listener {
|
|
|
|
// TODO: normalize addr with net.LookupPort
|
|
|
|
ln, ok := srv.Listeners[addr]
|
|
|
|
if !ok {
|
|
|
|
ln = newListener(srv, addr)
|
|
|
|
srv.Listeners[addr] = ln
|
|
|
|
}
|
|
|
|
return ln
|
|
|
|
}
|
|
|
|
|
2020-12-22 11:06:14 +00:00
|
|
|
func (srv *Server) startACME() error {
|
|
|
|
var ctx context.Context
|
|
|
|
ctx, srv.cancelACME = context.WithCancel(context.Background())
|
|
|
|
|
2021-02-17 17:33:07 +00:00
|
|
|
srv.ACMEConfig = certmagic.New(srv.acmeCache.cache, *srv.ACMEConfig)
|
|
|
|
srv.ACMEManager = certmagic.NewACMEManager(srv.ACMEConfig, *srv.ACMEManager)
|
|
|
|
|
2021-02-18 17:09:17 +00:00
|
|
|
srv.ACMEConfig.Issuers = []certmagic.Issuer{srv.ACMEManager}
|
2021-02-17 17:33:07 +00:00
|
|
|
|
2021-02-18 17:20:47 +00:00
|
|
|
srv.acmeCache.config.Store(srv.ACMEConfig)
|
2021-02-17 17:33:07 +00:00
|
|
|
|
2020-10-19 15:27:29 +00:00
|
|
|
for _, cert := range srv.UnmanagedCerts {
|
|
|
|
if err := srv.ACMEConfig.CacheUnmanagedTLSCertificate(cert, nil); err != nil {
|
2021-02-18 15:02:45 +00:00
|
|
|
return fmt.Errorf("failed to cache unmanaged TLS certificate: %v", err)
|
2020-10-19 15:27:29 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-22 11:06:14 +00:00
|
|
|
if err := srv.ACMEConfig.ManageAsync(ctx, srv.ManagedNames); err != nil {
|
2020-09-09 12:08:20 +00:00
|
|
|
return fmt.Errorf("failed to manage TLS certificates: %v", err)
|
|
|
|
}
|
|
|
|
|
2020-12-22 11:06:14 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (srv *Server) Start() error {
|
2021-02-17 17:33:07 +00:00
|
|
|
srv.acmeCache = newACMECache()
|
|
|
|
|
2020-12-22 11:06:14 +00:00
|
|
|
if err := srv.startACME(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-09-09 11:15:03 +00:00
|
|
|
for _, ln := range srv.Listeners {
|
|
|
|
if err := ln.Start(); err != nil {
|
2021-02-18 15:02:45 +00:00
|
|
|
return fmt.Errorf("failed to start listener: %v", err)
|
2020-09-09 11:15:03 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-12-22 11:06:14 +00:00
|
|
|
func (srv *Server) Stop() {
|
|
|
|
srv.cancelACME()
|
|
|
|
for _, ln := range srv.Listeners {
|
|
|
|
ln.Stop()
|
|
|
|
}
|
2021-02-17 17:45:14 +00:00
|
|
|
srv.acmeCache.cache.Stop()
|
2020-12-22 11:06:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Replace starts the server but takes over existing listeners from an old
|
|
|
|
// Server instance. The old instance keeps running unchanged if Replace
|
|
|
|
// returns an error.
|
|
|
|
func (srv *Server) Replace(old *Server) error {
|
|
|
|
// Try to start new listeners
|
|
|
|
for addr, ln := range srv.Listeners {
|
|
|
|
if _, ok := old.Listeners[addr]; ok {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if err := ln.Start(); err != nil {
|
|
|
|
for _, ln2 := range srv.Listeners {
|
|
|
|
ln2.Stop()
|
|
|
|
}
|
2021-02-18 15:02:45 +00:00
|
|
|
return fmt.Errorf("failed to start listener: %v", err)
|
2020-12-22 11:06:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-17 17:33:07 +00:00
|
|
|
// Steal the old server's ACME cache
|
|
|
|
srv.acmeCache = old.acmeCache
|
|
|
|
|
2020-12-22 11:06:14 +00:00
|
|
|
// Restart ACME
|
|
|
|
old.cancelACME()
|
|
|
|
if err := srv.startACME(); err != nil {
|
2021-02-18 15:02:45 +00:00
|
|
|
for _, ln := range srv.Listeners {
|
|
|
|
ln.Stop()
|
2020-12-22 11:06:14 +00:00
|
|
|
}
|
2021-02-18 15:02:45 +00:00
|
|
|
return fmt.Errorf("failed to start ACME: %v", err)
|
2020-12-22 11:06:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Take over existing listeners and terminate old ones
|
|
|
|
for addr, oldLn := range old.Listeners {
|
|
|
|
if ln, ok := srv.Listeners[addr]; ok {
|
|
|
|
srv.Listeners[addr] = oldLn.UpdateFrom(ln)
|
|
|
|
} else {
|
|
|
|
oldLn.Stop()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-18 17:09:37 +00:00
|
|
|
// Cleanup managed certs which are no longer used
|
|
|
|
managed := make(map[string]struct{}, len(old.ManagedNames))
|
|
|
|
for _, name := range srv.ManagedNames {
|
|
|
|
managed[name] = struct{}{}
|
|
|
|
}
|
|
|
|
unmanage := make([]string, 0, len(old.ManagedNames))
|
|
|
|
for _, name := range old.ManagedNames {
|
|
|
|
if _, ok := managed[name]; !ok {
|
|
|
|
unmanage = append(unmanage, name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
srv.ACMEConfig.Unmanage(unmanage)
|
|
|
|
|
|
|
|
// TODO: evict unused unmanaged certs from the cache
|
|
|
|
|
2020-12-22 11:06:14 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type listenerHandles struct {
|
2020-09-09 11:15:03 +00:00
|
|
|
Server *Server
|
|
|
|
Frontends map[string]*Frontend // indexed by server name
|
2020-09-08 15:13:39 +00:00
|
|
|
}
|
|
|
|
|
2020-12-22 11:06:14 +00:00
|
|
|
type Listener struct {
|
|
|
|
Address string
|
|
|
|
netLn net.Listener
|
|
|
|
atomic atomic.Value
|
|
|
|
}
|
|
|
|
|
2020-09-09 11:15:03 +00:00
|
|
|
func newListener(srv *Server, addr string) *Listener {
|
2020-12-22 11:06:14 +00:00
|
|
|
ln := &Listener{
|
|
|
|
Address: addr,
|
|
|
|
}
|
|
|
|
ln.atomic.Store(&listenerHandles{
|
2020-09-09 11:15:03 +00:00
|
|
|
Server: srv,
|
|
|
|
Frontends: make(map[string]*Frontend),
|
2020-12-22 11:06:14 +00:00
|
|
|
})
|
|
|
|
return ln
|
2020-09-09 11:15:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (ln *Listener) RegisterFrontend(name string, fe *Frontend) error {
|
2020-12-22 11:06:14 +00:00
|
|
|
fes := ln.atomic.Load().(*listenerHandles).Frontends
|
|
|
|
if _, ok := fes[name]; ok {
|
2020-09-09 11:15:03 +00:00
|
|
|
return fmt.Errorf("listener %q: duplicate frontends for server name %q", ln.Address, name)
|
|
|
|
}
|
2020-12-22 11:06:14 +00:00
|
|
|
fes[name] = fe
|
2020-09-09 11:15:03 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ln *Listener) Start() error {
|
2020-12-22 11:06:14 +00:00
|
|
|
var err error
|
|
|
|
ln.netLn, err = net.Listen("tcp", ln.Address)
|
2020-09-09 11:15:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
log.Printf("listening on %q", ln.Address)
|
|
|
|
|
|
|
|
go func() {
|
2020-12-22 11:06:14 +00:00
|
|
|
if err := ln.serve(); err != nil {
|
2020-09-09 11:15:03 +00:00
|
|
|
log.Fatalf("listener %q: %v", ln.Address, err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-12-22 11:06:14 +00:00
|
|
|
func (ln *Listener) Stop() {
|
|
|
|
ln.netLn.Close()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ln *Listener) UpdateFrom(new *Listener) *Listener {
|
|
|
|
ln.atomic.Store(new.atomic.Load())
|
|
|
|
return ln
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ln *Listener) serve() error {
|
2020-09-08 15:13:39 +00:00
|
|
|
for {
|
2020-12-22 11:06:14 +00:00
|
|
|
conn, err := ln.netLn.Accept()
|
|
|
|
if err != nil && strings.Contains(err.Error(), "use of closed network connection") {
|
|
|
|
// Listening socket has been closed by Stop()
|
|
|
|
return nil
|
|
|
|
} else if err != nil {
|
2020-09-08 15:13:39 +00:00
|
|
|
return fmt.Errorf("failed to accept connection: %v", err)
|
|
|
|
}
|
|
|
|
|
2020-09-08 16:24:16 +00:00
|
|
|
go func() {
|
2020-09-09 11:15:03 +00:00
|
|
|
if err := ln.handle(conn); err != nil {
|
|
|
|
log.Printf("listener %q: %v", ln.Address, err)
|
2020-09-08 16:24:16 +00:00
|
|
|
}
|
|
|
|
}()
|
2020-09-08 15:13:39 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-09 11:15:03 +00:00
|
|
|
func (ln *Listener) handle(conn net.Conn) error {
|
|
|
|
defer conn.Close()
|
2020-12-22 11:06:14 +00:00
|
|
|
srv := ln.atomic.Load().(*listenerHandles).Server
|
2020-09-09 11:15:03 +00:00
|
|
|
|
2020-12-22 11:06:14 +00:00
|
|
|
tlsConfig := srv.ACMEConfig.TLSConfig()
|
2020-10-19 08:53:36 +00:00
|
|
|
getConfigForClient := tlsConfig.GetConfigForClient
|
|
|
|
tlsConfig.GetConfigForClient = func(hello *tls.ClientHelloInfo) (*tls.Config, error) {
|
|
|
|
// Call previous GetConfigForClient function, if any
|
|
|
|
var tlsConfig *tls.Config
|
|
|
|
if getConfigForClient != nil {
|
|
|
|
var err error
|
|
|
|
tlsConfig, err = getConfigForClient(hello)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
} else {
|
2020-12-22 11:06:14 +00:00
|
|
|
tlsConfig = srv.ACMEConfig.TLSConfig()
|
2020-10-19 08:53:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fe, err := ln.matchFrontend(hello.ServerName)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2021-02-18 15:05:45 +00:00
|
|
|
tlsConfig.NextProtos = append(tlsConfig.NextProtos, fe.Protocols...)
|
2020-10-19 08:53:36 +00:00
|
|
|
return tlsConfig, nil
|
|
|
|
}
|
|
|
|
tlsConn := tls.Server(conn, tlsConfig)
|
2021-02-18 16:49:52 +00:00
|
|
|
|
|
|
|
if err := tlsConn.SetDeadline(time.Now().Add(tlsHandshakeTimeout)); err != nil {
|
|
|
|
return fmt.Errorf("failed to set TLS handshake timeout: %v", err)
|
|
|
|
}
|
2020-09-09 11:15:03 +00:00
|
|
|
if err := tlsConn.Handshake(); err != nil {
|
2021-02-18 15:02:45 +00:00
|
|
|
return fmt.Errorf("TLS handshake failed: %v", err)
|
2020-09-09 11:15:03 +00:00
|
|
|
}
|
2021-02-18 16:49:52 +00:00
|
|
|
if err := tlsConn.SetDeadline(time.Time{}); err != nil {
|
|
|
|
return fmt.Errorf("failed to reset TLS handshake timeout: %v", err)
|
|
|
|
}
|
|
|
|
// TODO: allow setting custom downstream timeouts
|
2020-09-09 11:15:03 +00:00
|
|
|
|
|
|
|
tlsState := tlsConn.ConnectionState()
|
2020-10-19 08:53:36 +00:00
|
|
|
fe, err := ln.matchFrontend(tlsState.ServerName)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-09-09 11:15:03 +00:00
|
|
|
|
2020-10-19 08:53:36 +00:00
|
|
|
return fe.handle(tlsConn, &tlsState)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ln *Listener) matchFrontend(serverName string) (*Frontend, error) {
|
2020-12-22 11:06:14 +00:00
|
|
|
fes := ln.atomic.Load().(*listenerHandles).Frontends
|
|
|
|
|
|
|
|
fe, ok := fes[serverName]
|
2020-09-12 17:43:16 +00:00
|
|
|
if !ok {
|
2020-10-19 08:53:36 +00:00
|
|
|
// Match wildcard certificates, allowing only a single, non-partial
|
|
|
|
// wildcard, in the left-most label
|
|
|
|
i := strings.IndexByte(serverName, '.')
|
|
|
|
// Don't allow wildcards with only a TLD (e.g. *.com)
|
|
|
|
if i >= 0 && strings.IndexByte(serverName[i+1:], '.') >= 0 {
|
2020-12-22 11:06:14 +00:00
|
|
|
fe, ok = fes["*"+serverName[i:]]
|
2020-09-12 17:43:16 +00:00
|
|
|
}
|
|
|
|
}
|
2020-09-09 11:15:03 +00:00
|
|
|
if !ok {
|
2020-12-22 11:06:14 +00:00
|
|
|
fe, ok = fes[""]
|
2020-09-09 11:15:03 +00:00
|
|
|
}
|
|
|
|
if !ok {
|
2020-10-19 08:53:36 +00:00
|
|
|
return nil, fmt.Errorf("can't find frontend for server name %q", serverName)
|
2020-09-09 11:15:03 +00:00
|
|
|
}
|
|
|
|
|
2020-10-19 08:53:36 +00:00
|
|
|
return fe, nil
|
2020-09-09 11:15:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type Frontend struct {
|
2020-10-19 08:53:36 +00:00
|
|
|
Backend Backend
|
|
|
|
Protocols []string
|
2020-09-09 11:15:03 +00:00
|
|
|
}
|
|
|
|
|
2020-10-09 10:21:19 +00:00
|
|
|
func (fe *Frontend) handle(downstream net.Conn, tlsState *tls.ConnectionState) error {
|
2020-09-08 15:13:39 +00:00
|
|
|
defer downstream.Close()
|
|
|
|
|
2021-02-18 16:49:52 +00:00
|
|
|
// TODO: setup upstream timeouts
|
|
|
|
|
2020-09-08 15:13:39 +00:00
|
|
|
be := &fe.Backend
|
|
|
|
upstream, err := net.Dial(be.Network, be.Address)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to dial backend: %v", err)
|
|
|
|
}
|
2020-10-31 09:34:02 +00:00
|
|
|
if be.TLSConfig != nil {
|
|
|
|
upstream = tls.Client(upstream, be.TLSConfig)
|
|
|
|
}
|
2020-09-08 15:13:39 +00:00
|
|
|
defer upstream.Close()
|
|
|
|
|
2020-09-09 12:52:41 +00:00
|
|
|
if be.Proxy {
|
2020-10-09 10:05:22 +00:00
|
|
|
h := proxyproto.HeaderProxyFromAddrs(2, downstream.RemoteAddr(), downstream.LocalAddr())
|
2020-10-09 10:21:19 +00:00
|
|
|
|
|
|
|
var tlvs []proxyproto.TLV
|
|
|
|
if tlsState.ServerName != "" {
|
|
|
|
tlvs = append(tlvs, authorityTLV(tlsState.ServerName))
|
|
|
|
}
|
2020-10-19 08:53:36 +00:00
|
|
|
if tlsState.NegotiatedProtocol != "" {
|
|
|
|
tlvs = append(tlvs, alpnTLV(tlsState.NegotiatedProtocol))
|
|
|
|
}
|
2020-10-09 12:45:55 +00:00
|
|
|
if tlv, err := sslTLV(tlsState); err != nil {
|
|
|
|
return fmt.Errorf("failed to set PROXY protocol header SSL TLV: %v", err)
|
|
|
|
} else {
|
|
|
|
tlvs = append(tlvs, tlv)
|
|
|
|
}
|
2020-10-09 10:21:19 +00:00
|
|
|
if err := h.SetTLVs(tlvs); err != nil {
|
|
|
|
return fmt.Errorf("failed to set PROXY protocol header TLVs: %v", err)
|
|
|
|
}
|
|
|
|
|
2020-09-09 12:52:41 +00:00
|
|
|
if _, err := h.WriteTo(upstream); err != nil {
|
|
|
|
return fmt.Errorf("failed to write PROXY protocol header: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-18 15:02:45 +00:00
|
|
|
if err := duplexCopy(upstream, downstream); err != nil {
|
|
|
|
return fmt.Errorf("failed to copy bytes: %v", err)
|
|
|
|
}
|
|
|
|
return nil
|
2020-09-08 15:13:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type Backend struct {
|
2020-10-31 09:34:02 +00:00
|
|
|
Network string
|
|
|
|
Address string
|
|
|
|
Proxy bool
|
|
|
|
TLSConfig *tls.Config // nil if no TLS
|
2020-09-08 15:13:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func duplexCopy(a, b io.ReadWriter) error {
|
|
|
|
done := make(chan error, 2)
|
|
|
|
go func() {
|
|
|
|
_, err := io.Copy(a, b)
|
|
|
|
done <- err
|
|
|
|
}()
|
|
|
|
go func() {
|
|
|
|
_, err := io.Copy(b, a)
|
|
|
|
done <- err
|
|
|
|
}()
|
|
|
|
return <-done
|
|
|
|
}
|
2020-10-09 10:21:19 +00:00
|
|
|
|
2020-10-29 13:21:03 +00:00
|
|
|
func authorityTLV(name string) proxyproto.TLV {
|
2020-10-09 10:21:19 +00:00
|
|
|
return proxyproto.TLV{
|
2020-10-29 13:21:03 +00:00
|
|
|
Type: proxyproto.PP2_TYPE_AUTHORITY,
|
|
|
|
Value: []byte(name),
|
2020-10-09 10:21:19 +00:00
|
|
|
}
|
|
|
|
}
|
2020-10-09 12:45:55 +00:00
|
|
|
|
2020-10-19 08:53:36 +00:00
|
|
|
func alpnTLV(proto string) proxyproto.TLV {
|
|
|
|
return proxyproto.TLV{
|
2020-12-08 16:03:58 +00:00
|
|
|
Type: proxyproto.PP2_TYPE_ALPN,
|
2020-10-19 08:53:36 +00:00
|
|
|
Value: []byte(proto),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-09 12:45:55 +00:00
|
|
|
func sslTLV(state *tls.ConnectionState) (proxyproto.TLV, error) {
|
|
|
|
pp2ssl := tlvparse.PP2SSL{
|
|
|
|
Client: tlvparse.PP2_BITFIELD_CLIENT_SSL, // all of our connections are TLS
|
|
|
|
Verify: 1, // we haven't checked the client cert
|
|
|
|
}
|
|
|
|
|
|
|
|
var version string
|
|
|
|
switch state.Version {
|
|
|
|
case tls.VersionTLS10:
|
|
|
|
version = "TLSv1.0"
|
|
|
|
case tls.VersionTLS11:
|
|
|
|
version = "TLSv1.1"
|
|
|
|
case tls.VersionTLS12:
|
|
|
|
version = "TLSv1.2"
|
|
|
|
case tls.VersionTLS13:
|
|
|
|
version = "TLSv1.3"
|
|
|
|
}
|
|
|
|
if version != "" {
|
2020-10-29 13:21:03 +00:00
|
|
|
versionTLV := proxyproto.TLV{
|
|
|
|
Type: proxyproto.PP2_SUBTYPE_SSL_VERSION,
|
|
|
|
Value: []byte(version),
|
|
|
|
}
|
2020-10-09 12:45:55 +00:00
|
|
|
pp2ssl.TLV = append(pp2ssl.TLV, versionTLV)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: add PP2_SUBTYPE_SSL_CIPHER, PP2_SUBTYPE_SSL_SIG_ALG, PP2_SUBTYPE_SSL_KEY_ALG
|
|
|
|
// TODO: check client-provided cert, if any
|
|
|
|
|
|
|
|
return pp2ssl.Marshal()
|
|
|
|
}
|